|
[1] B. Leiba, "OAuth Web Authorization Protocol," IEEE Internet Computing, vol. 16, no. 1, pp. 74-77, 2012. [2] Blockgeeks. 17 Blockchain Applications That Are Transforming Society. Available: https://blockgeeks.com/guides/blockchain-applications/ [3] M. Atzori. (2015). Blockchain Technology and Decentralized Governance: Is the State Still Necessary? Available: https://ssrn.com/abstract=2709713 [4] V. Gatteschi, F. Lamberti, C. Demartini, C. Pranteda, and V. Santamaría, "To Blockchain or Not to Blockchain: That Is the Question," IT Professional, vol. 20, no. 2, pp. 62-74, 2018. [5] H. Halaburda, "Blockchain revolution without the blockchain? %J Commun. ACM," vol. 61, no. 7, pp. 27-29, 2018. [6] M. J. M. Chowdhury, A. Colman, M. A. Kabir, J. Han, and P. Sarda, "Blockchain as a Notarization Service for Data Sharing with Personal Data Store," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 1330-1335. [7] B. K. Mohanta, S. S. Panda, and D. Jena, "An Overview of Smart Contract and Use Cases in Blockchain Technology," in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018, pp. 1-4: IEEE. [8] Ambisafe. Smart Contracts: 10 Use Cases for Business. Available: https://ambisafe.com/blog/smart-contracts-10-use-cases-business/ [9] Microsoft. (2012). The OAuth 2.0 Authorization Framework. Available: https://tools.ietf.org/html/rfc6749 [10] L. K. Ho and N. Katuk, "Social login with OAuth for mobile applications: User's view," in 2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2016, pp. 89-94. [11] S. Sciancalepore, G. Piro, D. Caldarola, G. Boggia, and G. Bianchi, "OAuth-IoT: An access control framework for the Internet of Things based on open standards," in 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, pp. 676-681. [12] M. V.S., "Use of Elliptic Curves in Cryptography.," In: Williams H.C. (eds) Advances in Cryptology — CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg. [13] S. Rouhani and R. Deters, "Performance analysis of ethereum transactions in private blockchain," in 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017, pp. 70-74. [14] D. Lin. (2019). 行政院宣布——智慧政府新計畫:台灣政府要用區塊鏈技術,建立各機關資料的交換機制. Available: https://www.blocktempo.com/taiwan-gv-want-to-use-blockchain-tech-build-data/?fbclid=IwAR1ZVw9fvQjIjfHFkhFhsyu5n4g8pJpijZ6UOsCMA3asdBGhiiMoX2YD1uY
|